1. CSI/FBI Crime and Security Survey;Gordon,2005
2. Constructing computer virus phylogenies;Goldberg;J. Algorithms,1998
3. Fixed period of temporary immunity after run of anti-malicious software on computer nodes;Mishra;Appl. Math. Comput.,2007
4. Dealing with software viruses: a biological paradigm;Gelenbe;Inf. Secur. Tech. Rep,2007
5. Keeping viruses under control;Gelenbe,2005